Описание
python-keystoneclient unsecure user password update
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2013-2013
- https://github.com/openstack/python-keystoneclient/commit/f2e0818bc97bfbeba83f6abbb07909a8debcad77
- https://bugs.launchpad.net/python-keystoneclient/+bug/938315
- https://github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2013-24.yaml
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16937
- http://www.openwall.com/lists/oss-security/2013/05/23/4
Пакеты
python-keystoneclient
< 0.2.4
0.2.4
Связанные уязвимости
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
The user-password-update command in python-keystoneclient before 0.2.4 ...